All Projects → reosploit → Similar Projects or Alternatives

1263 Open source projects that are alternatives of or similar to reosploit

tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+57.3%)
exploiting
Exploiting challenges in Linux and Windows
Stars: ✭ 122 (+37.08%)
Mutual labels:  exploit, exploits, exploitation
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+907.87%)
Mutual labels:  exploit, exploitation, hacking-tool
Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+589.89%)
Mutual labels:  exploit, exploits, exploitation
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-78.65%)
Mutual labels:  exploit, exploits, exploitation
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+432.58%)
Mutual labels:  exploit, exploits, hacking-tool
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-31.46%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+1464.04%)
Featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+884.27%)
Mutual labels:  exploit, exploits, exploitation
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+329.21%)
Mutual labels:  exploit, cybersecurity, enumeration
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-42.7%)
Mutual labels:  exploit, cybersecurity, hacking-tool
exploits
Some of my public exploits
Stars: ✭ 50 (-43.82%)
Mutual labels:  exploit, exploits, exploitation
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+877.53%)
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+239.33%)
Mida Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (+61.8%)
Mutual labels:  exploit, enumeration, exploitation
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (-67.42%)
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+11642.7%)
Mutual labels:  exploit, cybersecurity, exploits
SubRosa
Basic tool to automate backdooring PE files
Stars: ✭ 48 (-46.07%)
Mutual labels:  exploit, exploitation
Python
Python Powered Repository
Stars: ✭ 17 (-80.9%)
Mutual labels:  exploit, exploitation
exploit
Collection of different exploits
Stars: ✭ 153 (+71.91%)
Mutual labels:  exploit, exploits
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+108.99%)
Mutual labels:  exploit, hacking-tool
discord-bugs-exploits
A Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-75.28%)
Mutual labels:  exploit, exploits
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+753.93%)
Mutual labels:  exploit, cybersecurity
C-Experiments
Experiments on C/C++ Exploits
Stars: ✭ 19 (-78.65%)
Mutual labels:  exploit, exploits
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+2089.89%)
Mutual labels:  exploit, cybersecurity
Android Exploits
A collection of android Exploits and Hacks
Stars: ✭ 290 (+225.84%)
Mutual labels:  exploit, exploits
Androrat
AndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+282.02%)
Mutual labels:  exploit, exploitation
CVE-2019-8449
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (-25.84%)
Mutual labels:  exploit, exploits
Discord-Token-Cracker
Simple and fast discord token cracker
Stars: ✭ 52 (-41.57%)
Mutual labels:  exploit, exploits
Discord Exploit Collection
A collection of Discord bugs and exploits
Stars: ✭ 166 (+86.52%)
Mutual labels:  exploit, exploits
HatVenom
HatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-5.62%)
Mutual labels:  exploit, exploits
Hack Tools
hack tools
Stars: ✭ 488 (+448.31%)
Mutual labels:  exploit, hacking-tool
Heap Viewer
An IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+544.94%)
Mutual labels:  exploit, exploitation
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (-67.42%)
Mutual labels:  exploit, exploitation
nocom-explanation
block game military grade radar
Stars: ✭ 544 (+511.24%)
Mutual labels:  exploit, exploitation
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+42.7%)
Mutual labels:  exploit, exploitation
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+504.49%)
Mutual labels:  exploit, cybersecurity
moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+511.24%)
Mutual labels:  exploit, exploitation
Gtfo
Search gtfobins and lolbas files from your terminal
Stars: ✭ 336 (+277.53%)
Mutual labels:  exploit, enumeration
MS17010EXP
Ladon Moudle MS17010 Exploit for PowerShell
Stars: ✭ 40 (-55.06%)
Mutual labels:  exploit, hacking-tool
Autosploit
Automated Mass Exploiter
Stars: ✭ 4,500 (+4956.18%)
Mutual labels:  exploit, exploitation
Cve 2020 15906
Writeup of CVE-2020-15906
Stars: ✭ 39 (-56.18%)
Mutual labels:  exploit, exploitation
Pysploit
Remote exploitation framework written in Python
Stars: ✭ 37 (-58.43%)
Mutual labels:  exploit, exploitation
Xxexploiter
Tool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+173.03%)
Mutual labels:  exploit, exploitation
Lpe
collection of verified Linux kernel exploits
Stars: ✭ 159 (+78.65%)
Mutual labels:  exploit, exploits
Antimalware Research
Research on Anti-malware and other related security solutions
Stars: ✭ 163 (+83.15%)
Mutual labels:  exploit, exploitation
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-19.1%)
Mutual labels:  exploit, exploits
Activereign
A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Stars: ✭ 210 (+135.96%)
Mutual labels:  exploit, enumeration
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+797.75%)
Mutual labels:  exploit, exploitation
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-7.87%)
Mutual labels:  exploit, hacking-tool
Write Ups
📚 VoidHack CTF write-ups
Stars: ✭ 45 (-49.44%)
Mutual labels:  exploit, exploitation
Yookiterm Slides
Exploitation and Mitigation Slides
Stars: ✭ 74 (-16.85%)
Mutual labels:  exploit, exploitation
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+171.91%)
Mutual labels:  exploit, hacking-tool
Hisilicon Dvr Telnet
PoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (+13.48%)
Mutual labels:  exploit, exploits
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (+39.33%)
Mutual labels:  exploit, hacking-tool
Cve 2019 9810
Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: ✭ 200 (+124.72%)
Mutual labels:  exploit, exploitation
Tools
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+1408.99%)
Mutual labels:  exploit, exploits
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+41.57%)
Mutual labels:  exploit, hacking-tool
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (+60.67%)
Mutual labels:  exploit, hacking-tool
Powershell Red Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (+74.16%)
Mutual labels:  cybersecurity, enumeration
1-60 of 1263 similar projects